CVE-2021-26084

CRITICAL
2021-08-30 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 26, 2026 - 11:19 vuln.today
Added to CISA KEV
Oct 24, 2025 - 13:38 cisa
CISA KEV
PoC Detected
Oct 24, 2025 - 13:38 vuln.today
Public exploit code
Patch Released
Oct 24, 2025 - 13:38 nvd
Patch available
CVE Published
Aug 30, 2021 - 07:15 nvd
CRITICAL 9.8

Description

In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.

Analysis

Confluence Server and Data Center contain an OGNL injection vulnerability allowing unauthenticated remote code execution, triggering mass exploitation campaigns for cryptocurrency mining and ransomware in September 2021.

Technical Context

The CWE-917 OGNL (Object-Graph Navigation Language) injection allows attackers to inject OGNL expressions through user-controllable parameters. Confluence's Webwork framework evaluates these expressions server-side, enabling execution of arbitrary Java code and OS commands.

Affected Products

['Confluence Server before 6.13.23', 'Confluence Server 6.14.0 before 7.4.11', 'Confluence Server 7.5.0 before 7.11.6', 'Confluence Server 7.12.0 before 7.12.5']

Remediation

Upgrade Confluence immediately. Check for web shells and cryptominers. Review Confluence content for evidence of data exfiltration. Restrict external access to Confluence.

Priority Score

223
Low Medium High Critical
KEV: +50
EPSS: +94.4
CVSS: +49
POC: +20

Share

CVE-2021-26084 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy